I have been reading a bit lately about PSP exploits and also on HackMii about the STM Release Exploit. And I have a few questions about Wii exploits (e.g. Twilight Hack, not IOS exploits, what would be called on PSP "user mode exploits")

1. How can the "return address" (assuming that's what its called on Wii) of the Wii be monitored? USBGecko I assume?2. Is there a way you can find out all functions imported by a DOL?3. In the STM Release Exploit HackMii post, it talks of how it is in Twilight Hack, yet it is an IOS exploit AFAIK. Is an IOS exploit necessary simply to load a DOL/ELF file? I thought the IOS exploits were used in the loaded DOL/ELF...

I think that's all for now, if anyone can answer at least some of these questions, that'd be very handy.

1) Patch OSReport to output over USB Gecko. Gecko OS can do this but you need to enable the fwrite option in a config file on SD.2) SEL and IDA SEL Loader.3) No. Twilight Hack doesn't use STM Release exploit, it just writes certain addresses to RAM so that IOS doesn't crash.